Academic Journal of Computing & Information Science, 2019, 2(3); doi: 10.25236/AJCIS.020314.
Jingdezhen Ceramic Institute, Jingdezhen 333403,China
With the continuous development of science and technology in China, the current society has shown an informatization and intelligent development trend. As an emerging technology, cloud computing has the characteristics of promoting the efficient and convenient resource sharing process and has an important impact on people's daily lives. Although cloud computing provides convenience to people, because it needs to collect and organize personal information of users, this will cause a series of security issues and affect the overall network environment. This article mainly starts from the basic overview of cloud computing, analyzes the problems of computer network security and specific protection measures in the cloud computing environment, and hopes to provide valuable reference for related computer network security staff.
"cloud computing"; computer; network security; solution
Yan Li. Discussion on Computer Network Security in "Cloud Computing" Environment. Academic Journal of Computing & Information Science (2019), Vol. 2, Issue 3: 120-125. https://doi.org/10.25236/AJCIS.020314.
 Qi Xin, Jia Jiahua, Li Fangyu (2019). Cognition and Thinking of Computer Network Security in Cloud Computing Environment. World of Digital Communications, vol.45, no.28, pp.129-129.
 Wu Jian (2019). Thinking and Analysis of Computer Network Security in Cloud Computing Environment. Digital World, vol.45, no.41, pp.100-101.
 Lin Mingxin (2017). Computer Network Security in "Cloud Computing" Environment. Science and Information Technology, vol.23, no.34, pp.156 -157.
 Song Hengli (2018). Computer Network Security in Cloud Computing Environment. Digital World, vol.12, no.12, pp.234-235.
 Peng Yuanhui (2019). Analysis of Computer Network Security in Cloud Computing Environment. Science & Technology Innovation Review, vol.45, no.12, pp.236-237.
 Li Yinli (2018). Application of cloud computing technology in secure storage of computer network. Military-civilian dual-use technology and products, vol.45, no.12, pp.173-174.
 Liao Wei (2017). Talking about Network Security Threats and Countermeasures in Cloud Computing. Digital World, vol.45, no.18, pp.137-137.
 Zhang Hansen (2018). On Information Security Audit System in Cloud Computing Environment. Information Communications, vol.54, no.13, pp.178-179.